Catalog Search Results
1) Cyber crimes
Author
Description
Discusses the high tech crimes committed by hackers, crackers, and phone phreaks using computers, including fraud, embezzlement, and espionage, as well as the best ways to minimize the occurrence of such crimes.
Author
Description
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier...
5) Hackers
Description
While practicing the tricks of the trade, a neophyte "hacker" accomplishes the nearly impossible: he hacks the highly secured Gibson computer at the Ellingson Mineral Corporation. But in doing so, he unknowingly taps into a high-tech embezzling scheme which is masked by a virus that could cause a horrific environmental disaster. In the flash of a nanosecond, the young hacker and his pals are targeted for the crime by the FBI and Ellingson's deranged...
6) Firewall
Description
Thieves threaten to kill Jack Stanfield's family if he doesn't hack into a computer system through a firewall he designed in order to transfer 100 million dollars to an offshore account.
7) Trust
Description
When a young girl is assaulted by an older man she meets on the Internet, her family's bonds are ripped apart as her father searches across the country in an effort to track down her attacker and exact revenge.
8) Net force
Author
Description
In the year 2010, computers are the new superpowers. Those who control them, control the world. To enforce the Net Laws, Congress creates the ultimate computer security agency within the FBI: Net Force.
9) The cipher
Author
Description
"Robert 'Smiles' Smylie and his friend Ben become embroiled in a high-stakes negotiation with a pair of suspicious Feds when Ben cracks a code with the power to unlock all the Internet's secrets"--
Description
Lisbeth Salander, the highly-skilled vigilante from the acclaimed Millennium book series is back. Salander and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials, as they race to rescue a dangerous program capable of global destruction held by shadowy figures linked to Lisbeth's past.
11) The fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
12) Snowden
Description
An employee of the National Security Agency leaks their illegal surveillance techniques to the public by distributing thousands of classified documents to the press.
13) Black widow
Author
Description
Entreated by his goddaughter to help pay off a blackmailer who videotaped her bachelorette party and then threatened to expose her debauchery, Doc Ford reluctantly agrees and then finds himself in danger when the extortionist releases the tape anyway.
14) Dark angel
Author
Formats
Description
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more...
15) Ghost ship
Author
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht' he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown' or was the yacht abandoned when he came aboard? Kurt doesn't trust either recollection. Searching for answers' he soon finds himself descending into a shadowy world of state-sponsored cybercrime' and uncovering a web of human trafficking.
16) Fear No Evil
Author
Description
Instead of preparing for her high school graduation, Lucy Kincaid is facing a vicious execution. Lured by an online predator, she is destined to die horribly, live on the Internet, while hundreds of heartless viewers watch and vote on the method of her slaughter. Her only hope rests with Kate Donovan, an FBI agent who took on the same sadistic killer once before.
Author
Formats
Description
On the eve of a top secret space mission, Captain Calli Chase detects a tripped alarm in the tunnels deep below a NASA research center. A NASA pilot, quantum physicist, and cybercrime investigator, Calli knows that a looming blizzard and government shutdown could provide the perfect cover for sabotage, with deadly consequences. As it turns out, the danger is worse than she thought. A spatter of dried blood, a missing security badge, a suspicious suicide-a...
19) 1st case
Author
Formats
Description
"Angela's graduate school days at MIT come to an abrupt end when she uses her hacking skills on another student's computer. Yet her mentor, Eve Abajian, arranges a new beginning for her -- as an intern in FBI's Boston field office. Her new supervisor, Assistant Special Agent in Charge William Keats, one of only two agents in the Northeast to make his rank before the age of thirty, sees in Angela a fellow prodigy. But Angela's skills come with a natural...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request